# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d4bcc3fb4879bbb5e45f2ae5ec672e95e6964ee5b28639dd6bd11cabbbe4d221
Pseudo Output
3ccd80e02b8c4452ba1e7015f010a130da61742a37cdf3a92ba13339a883e746
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c0ffab2e2f6de0d818fa49ab610e511e4f42d7b6947993d48f744a6db5a7715f
Commitment
aac654a320b38cecbd843f463a3b8e9c186b2b205ec5d3f5beec0df038dacc04
Range Proof
672 bytes (Bulletproof)
Memo
164d07a3f24d34116a7b9cadc189922435719e5961d4136cb8059e991745338eb43c7170760da3958deb2437bd20cf0cb1be1194a8d899d41315538aa7a93e494476131bb96c9c08a9bf522cea1cc40342be3437c2f6ce17f14d6395021d54d7d57a460f7a21bb46ca957b762ff7cc6841a746fa574e70d80044a7832b534082 (encrypted)
Stealth Address
8e21f4c9213be381903d92fe8351dcaf0565127f23af873181a25bb97cad6a0e
Commitment
36b6b1f44e3b305e41bd02ce24f01e36ebe33f3c4d4162e39d30a5fa7747e37d
Range Proof
672 bytes (Bulletproof)
Memo
b83177ca42c64e7ea69a5c00de2d88dcde0d6ed67d2ea7f77c2dda0a5976711610a751734decd1c27f4c57776b0dae86ae1ff4698ff5509faf2d63ff2aaeb7b0002407edfbe4f39439f2e3aaf1349a451c73414b535068000870f28f2965fd0326a656a44be63567fa9b94a07cc57be15ab178e051ae97a375d08653e35c3928 (encrypted)
Stealth Address
7e72342518086a759905f665dae684dfe06d7adf6e110d5b2d1206e832d1ad3e
Commitment
56c67f1723ca295ceac64505cea7850dfdc789ec297b31f171c36be0ea92c13e
Range Proof
672 bytes (Bulletproof)
Memo
47fb2fed80afbc049dc168ece7982d42e820506e31cabfcc6e52787f67beda9ffa0c3650c6d5f88f677cc1ddf99e9c18d4dc3a0049e4ebfa5809deb5c770b7e20f12f4b33777a64de4cff6e85f1f5ca29735941fdb12f6ccd18e458ab2a5c455a1284491a1455b46ddb51c2190dc51d288840852d51ae32beac7c5a1828da1e7 (encrypted)